[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Recommended reading: Authentication in Distributed Systems

You can find an abstract for
"Authentication in Distributed Systems: Theory and Practice" at
together with a pointer to the postscript for the complete paper...

        Ron Rivest
Return-Path: <jpp@software.net>
X-Sender: jpp@mail.software.net
Mime-Version: 1.0
Date: Thu, 29 Feb 1996 22:15:22 -0800
To: rivest@theory.lcs.mit.edu (Ron Rivest)
From: John Pettitt <jpp@software.net>
Subject: Re: BAN logic

Do you know if either paper is available for ftp or on the web ?



At 08:48 PM 2/29/96 EST, you wrote:
>I just want to second Joe Tardo's recommendation of the Burrows, Abadi,
>Needham paper ("A logic of authentication", ACM TOCS, Feb. 1990).  
>Another closely related paper:
>author =       {Butler Lampson and Mart\'in Abadi and Michael Burrows
>               and and Edward Wobber},
>title =        {Authentication in Distributed Systems: Theory and Practice},
>journal =      {TOCS},
>month =        Nov,
>year =         1992,
>volume =       10,
>number =       4,
>pages =        {265-310}
>is also excellent and well worth reading.  I'd consider theese papers
>as ``must'' background readings for this group...
>       Cheers,
>       Ron Rivest
John Pettitt
email:         jpettitt@well.sf.ca.us (home)
               jpp@software.net       (work)